SP A*

262 papers

YearTitle / Authors
2024"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing.
Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni
2024"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning.
Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang
2024"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili
2024A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok.
Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee
2024A Representative Study on Human Detection of Artificially Generated Media Across Countries.
Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz
2024A Security Analysis of Honey Vaults.
Fei Duan, Ding Wang, Chunfu Jia
2024A Systematic Study of Physical Sensor Attack Hardness.
Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu
2024A Tale of Two Industroyers: It was the Season of Darkness.
Luis E. Salazar, Sebastián R. Castro, Juan Lozano, Keerthi Koneru, Emmanuele Zambon, Bing Huang, Ross Baldick, Marina Krotofil, Alonso Rojas, Alvaro A. Cárdenas
2024AFGen: Whole-Function Fuzzing for Applications and Libraries.
Yuwei Liu, Yanhao Wang, Xiangkun Jia, Zheng Zhang, Purui Su
2024ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren
2024APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns.
Jiasheng Jiang, Jingzheng Wu, Xiang Ling, Tianyue Luo, Sheng Qu, Yanjun Wu
2024ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation.
Joyanta Debnath, Christa Jenkins, Yuteng Sun, Sze Yiu Chau, Omar Chowdhury
2024AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
2024AirTaint: Making Dynamic Taint Analysis Faster and Easier.
Qian Sang, Yanhao Wang, Yuwei Liu, Xiangkun Jia, Tiffany Bao, Purui Su
2024An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.
Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath
2024AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi
2024Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs.
Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens
2024Asterisk: Super-fast MPC with a Friend.
Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi
2024Attacking Byzantine Robust Aggregation in High Dimensions.
Sarthak Choudhary, Aashish Kolluri, Prateek Saxena
2024Attacking and Improving the Tor Directory Protocol.
Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate
2024Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization.
William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang
2024BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang
2024BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers.
Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider
2024BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect.
Cristiano Rodrigues, Daniel Oliveira, Sandro Pinto
2024Backdooring Multimodal Learning.
Xingshuo Han, Yutong Wu, Qingjie Zhang, Yuan Zhou, Yuan Xu, Han Qiu, Guowen Xu, Tianwei Zhang
2024BadVFL: Backdoor Attacks in Vertical Federated Learning.
Mohammad Naseri, Yufei Han, Emiliano De Cristofaro
2024Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets.
Chen Gong, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Kecen Li, Arunesh Sinha, Bowen Xu, Xinwen Hou, David Lo, Tianhao Wang
2024Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation.
Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim
2024BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild.
Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang
2024Bounded and Unbiased Composite Differential Privacy.
Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen
2024Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services.
Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos
2024Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan
2024Budget Recycling Differential Privacy.
Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan
2024Bulkor: Enabling Bulk Loading for Path ORAM.
Xiang Li, Yunqian Luo, Mingyu Gao
2024C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks.
Hoang Dai Nguyen, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, Phani Vadrevu
2024CORELOCKER: Neuron-level Usage Control.
Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai
2024CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers.
Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif
2024Can we cast a ballot as intended and be receipt free?
Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang
2024Casual Users and Rational Choices within Differential Privacy.
Narges Ashena, Oana Inel, Badrie L. Persaud, Abraham Bernstein
2024Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches.
Huancheng Zhou, Guofei Gu
2024Certifying Zero-Knowledge Circuits with Refinement Types.
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng
2024Children, Parents, and Misinformation on Social Media.
Filipo Sharevski, Jennifer Vander Loop
2024Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay.
Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Ming Gu, Qing Liao, Yu Jiang
2024Cohere: Managing Differential Privacy in Large Scale Systems.
Nicolas Küchler, Emanuel Opel, Hidde Lycklama, Alexander Viand, Anwar Hithnawi
2024Combing for Credentials: Active Pattern Extraction from Smart Reply.
Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans
2024Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage.
Andrew Park, Trevor Leong, Francisco Maturana, Wenting Zheng, K. V. Rashmi
2024ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks.
Sushant Dinesh, Madhusudan Parthasarathy, Christopher W. Fletcher
2024Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams.
Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz
2024CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model.
Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson
2024DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Xiang Li, Dashuai Wu, Haixin Duan, Qi Li
2024DP-Auditorium: A Large-Scale Library for Auditing Differential Privacy.
William Kong, Andrés Muñoz Medina, Mónica Ribero, Umar Syed
2024DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming.
Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong
2024DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing.
Max Ammann, Lucca Hirschi, Steve Kremer
2024DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA.
Yukui Luo, Adnan Siraj Rakin, Deliang Fan, Xiaolin Xu
2024DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal
2024DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao
2024Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core.
Martin R. Albrecht, Benjamin Dowling, Daniel Jones
2024Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups.
Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse
2024Distributed & Scalable Oblivious Sorting and Shuffling.
Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos
2024Distribution Preserving Backdoor Attack in Self-supervised Learning.
Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang
2024Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Daniel Schlette, Philip Empl, Marco Caselli, Thomas Schreck, Günther Pernul
2024Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater.
Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame
2024Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users.
David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi
2024DrSec: Flexible Distributed Representations for Efficient Endpoint Security.
Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz, David Ott
2024Dropout Attacks.
Andrew Yuan, Alina Oprea, Cheng Tan
2024E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting.
Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Galiñanes, Bryan Ford
2024ERASan: Efficient Rust Address Sanitizer.
Jiun Min, Dongyeon Yu, Seongyun Jeong, Dokyung Song, Yuseok Jeon
2024Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage.
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang
2024Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang
2024Efficient Zero-Knowledge Arguments For Paillier Cryptosystem.
Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li
2024Efficient and Generic Microarchitectural Hash-Function Recovery.
Lukas Gerlach, Simon Schwarz, Nicolas Faroß, Michael Schwarz
2024Enforcing End-to-end Security for Remote Conference Applications.
Yuelin Liu, Huangxun Chen, Zhice Yang
2024Eureka: A General Framework for Black-box Differential Privacy Estimators.
Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas
2024Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors.
Sabrina Amft, Sandra Höltervennhoff, Rebecca Panskus, Karola Marky, Sascha Fahl
2024Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference.
Heqing Huang, Anshunkang Zhou, Mathias Payer, Charles Zhang
2024Exploring the Orthogonality and Linearity of Backdoor Attacks.
Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang
2024FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models.
Yanting Wang, Wei Zou, Jinyuan Jia
2024FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks.
Ehsanul Kabir, Zeyu Song, Md. Rafi Ur Rashid, Shagufta Mehnaz
2024Few-shot Unlearning.
Youngsik Yoon, Jinhwan Nam, Hyojeong Yun, Jaeho Lee, Dongwoo Kim, Jungseul Ok
2024Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning.
Mati Ur Rehman, Hadi Ahmadi, Wajih Ul Hassan
2024FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
2024Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.
Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru
2024From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models.
Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh
2024From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning.
Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu
2024From Principle to Practice: Vertical Data Minimization for Machine Learning.
Robin Staab, Nikola Jovanovic, Mislav Balunovic, Martin T. Vechev
2024From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover.
Xingli Zhang, Yazhou Tu, Yan Long, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei
2024GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols.
Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
2024GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression.
Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher
2024GrOVe: Ownership Verification of Graph Neural Networks using Embeddings.
Asim Waheed, Vasisht Duddu, N. Asokan
2024Group Oblivious Message Retrieval.
Zeyu Liu, Eran Tromer, Yunhao Wang
2024Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information.
Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu
2024Holepunch: Fast, Secure File Deletion with Crash Consistency.
Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams
2024Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.
Penghui Li, Wei Meng, Mingxue Zhang, Chenlin Wang, Changhua Luo
2024Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference.
Sarabjeet Singh, Shreyas Singh, Sumanth Gudaparthi, Xiong Fan, Rajeev Balasubramonian
2024IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024
2024INVISILINE: Invisible Plausibly-Deniable Storage.
Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion
2024Injection Attacks Against End-to-End Encrypted Applications.
Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart
2024Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting.
Karola Marky, Nina Gerber, Henry John Krumb, Mohamed Khamis, Max Mühlhäuser
2024It's Simplex! Disaggregating Measures to Improve Certified Robustness.
Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein
2024Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution.
Kasra Edalatnejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso
2024Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation.
Feng Xiao, Zhongfu Su, Guangliang Yang, Wenke Lee
2024Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks.
Joseph Khoury, Dorde Klisura, Hadi Zanddizari, Gonzalo De La Torre Parra, Peyman Najafirad, Elias Bou-Harb
2024Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han
2024LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs.
Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue
2024LLMIF: Augmented Large Language Model for Fuzzing IoT Devices.
Jincheng Wang, Le Yu, Xiapu Luo
2024LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks.
Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini
2024Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices.
Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao
2024Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts.
Christoph Sendner, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko
2024Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security.
Jannik Albrecht, Sébastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Azzurra Marson, Julian Willingmann
2024Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation.
Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida
2024Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning.
Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue
2024Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches.
Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, Reza Rejaie, Walter Willinger
2024Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser.
Ruihan Wang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2024Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation.
Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi
2024Lower Bounds for Rényi Differential Privacy in a Black-Box Setting.
Tim Kutta, Önder Askin, Martin Dunsche
2024MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion.
Zilong Lin, Zhengyi Li, Xiaojing Liao, Xiaofeng Wang, Xiaozhong Liu
2024MEA-Defender: A Robust Watermark against Model Extraction Attack.
Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang
2024MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption.
Jun Luo, Hangcheng Cao, Hongbo Jiang, Yanbing Yang, Zhe Chen
2024MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic.
Hang Wang, Zhen Xiang, David J. Miller, George Kesidis
2024MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography.
Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang
2024MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing
2024Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption.
Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng
2024Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis.
Priyanka Nanayakkara, Hyeok Kim, Yifan Wu, Ali Sarvghad, Narges Mahyar, Gerome Miklau, Jessica Hullman
2024Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel
2024MetaFly: Wireless Backhaul Interception via Aerial Wavefront Manipulation.
Zhambyl Shaikhanov, Sherif Badran, Hichem Guerboukha, Josep Miquel Jornet, Daniel M. Mittleman, Edward W. Knightly
2024Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu
2024More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services.
Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao
2024More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR.
Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate
2024Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection.
Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma
2024Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
Cas Cremers, Eyal Ronen, Mang Zhao
2024NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun
2024Nebula: A Privacy-First Platform for Data Backhaul.
Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa
2024Need for Speed: Taming Backdoor Attacks with Speed and Precision.
Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin
2024NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge.
Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
2024Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao
2024No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment.
Anh V. Vu, Alice Hutchings, Ross J. Anderson
2024No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML.
Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
2024Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks.
Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou
2024Non-Atomic Arbitrage in Decentralized Finance.
Lioba Heimbach, Vabuk Pahari, Eric Schertenleib
2024Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu
2024Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung
2024Obelix: Mitigating Side-Channels Through Dynamic Obfuscation.
Jan Wichelmann, Anja Rabich, Anna Pätschke, Thomas Eisenbarth
2024OdScan: Backdoor Scanning for Object Detection Models.
Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang
2024On (the Lack of) Code Confidentiality in Trusted Execution Environments.
Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun
2024On Large Language Models' Resilience to Coercive Interrogation.
Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang
2024On SMS Phishing Tactics and Infrastructure.
Aleksandr Nahapetyan, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos, Bradley Reaves
2024One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi
2024Optimal Flexible Consensus and its Application to Ethereum.
Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse
2024Orca: FSS-based Secure Training and Inference with GPUs.
Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma
2024P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF.
Osama Bajaber, Bo Ji, Peng Gao
2024PIRANA: Faster Multi-query PIR via Constant-weight Codes.
Jian Liu, Jingyu Li, Di Wu, Kui Ren
2024POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance.
Rui Xi, Zehua Wang, Karthik Pattabiraman
2024Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes.
Fritz Alder, Lesly-Ann Daniel, David F. Oswald, Frank Piessens, Jo Van Bulck
2024Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials.
David Klein, Martin Johns
2024PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph.
Jaehan Kim, Minkyoo Song, Minjae Seo, Youngjin Jin, Seungwon Shin
2024Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
Sandra Rivera Pérez, Michel van Eeten, Carlos Hernandez Gañán
2024Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs.
Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang
2024Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation.
Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi
2024Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack.
Han Liu, Yuhao Wu, Zhiyuan Yu, Ning Zhang
2024Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models.
Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim
2024Poisoning Web-Scale Training Datasets is Practical.
Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr
2024PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support.
Daniel Schadt, Christoph Coijanovic, Christiane Weis, Thorsten Strufe
2024Practical Attacks Against DNS Reputation Systems.
Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos D. Keromytis, Manos Antonakakis
2024Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices.
Hadi Givehchian, Nishant Bhaskar, Alexander Redding, Han Zhao, Aaron Schulman, Dinesh Bharadia
2024Predecessor-aware Directed Greybox Fuzzing.
Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang
2024Preserving Node-level Privacy in Graph Neural Networks.
Zihang Xiang, Tianhao Wang, Di Wang
2024PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments.
Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin
2024Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs.
Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa
2024Private Hierarchical Governance for Encrypted Messaging.
Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart
2024PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification.
Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren
2024Protecting Label Distribution in Cross-Silo Federated Learning.
Yangfan Jiang, Xinjian Luo, Yuncheng Wu, Xiaokui Xiao, Beng Chin Ooi
2024Prune+PlumTree - Finding Eviction Sets at Scale.
Tom Kessous, Niv Gilboa
2024Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments.
Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar
2024Pudding: Private User Discovery in Anonymity Networks.
Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford
2024Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud.
Mingxuan Yao, Runze Zhang, Haichuan Xu, Shih-Huan Chou, Varun Chowdhary Paturi, Amit Kumar Sikder, Brendan Saltaformaggio
2024R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection.
Akul Goyal, Gang Wang, Adam Bates
2024Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu
2024Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity.
Xinming Wei, Jiaxi Zhang, Guojie Luo
2024Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu
2024Revisiting Black-box Ownership Verification for Graph Neural Networks.
Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu
2024Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics.
Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang
2024Routing Attacks on Cryptocurrency Mining Pools.
Muoi Tran, Theo von Arx, Laurent Vanbever
2024SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks.
Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage
2024SINBAD: Saliency-informed detection of breakage caused by ad blocking.
Saiid El Hajj Chehade, Sandra Deepthy Siby, Carmela Troncoso
2024Sabre: Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstruction.
Alec F. Diallo, Paul Patras
2024Saturn: Host-Gadget Synergistic USB Driver Fuzzing.
Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang
2024Scalable Mixed-Mode MPC.
Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang
2024Scalable Verification of Zero-Knowledge Protocols.
Miguel Isabel, Clara Rodríguez-Núñez, Albert Rubio
2024Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems.
Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, Jae Hong Seo
2024Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption.
Cas Cremers, Mang Zhao
2024Secure Ranging with IEEE 802.15.4z HRP UWB.
Xiliang Luo, Cem Kalkanli, Hao Zhou, Pengcheng Zhan, Moche Cohen
2024Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples.
Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin
2024Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan
2024Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study.
Mindy Tran, Collins W. Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, Yasemin Acar
2024Serberus: Protecting Cryptographic Code from Spectres at Compile-Time.
Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel
2024Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities.
Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson
2024Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration.
Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei
2024Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, James C. Davis
2024SmartInv: Multimodal Learning for Smart Contract Invariant Inference.
Sally Junsong Wang, Kexin Pei, Junfeng Yang
2024SneakyPrompt: Jailbreaking Text-to-image Generative Models.
Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
2024SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms.
Md. Sadun Haq, Thien Duc Nguyen, Ali Saman Tosun, Franziska Vollmer, Turgay Korkmaz, Ahmad-Reza Sadeghi
2024SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
Jelle Vos, Mauro Conti, Zekeriya Erkin
2024SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson
2024SoK: Explainable Machine Learning in Adversarial Environments.
Maximilian Noppel, Christian Wressnegger
2024SoK: Privacy-Preserving Data Synthesis.
Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David A. Forsyth, Bo Li, Dawn Song
2024SoK: Prudent Evaluation Practices for Fuzzing.
Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz
2024SoK: SGX.Fail: How Stuff Gets eXposed.
Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman
2024SoK: Safer Digital-Safety Research Involving At-Risk Users.
Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart
2024SoK: Security and Privacy of Blockchain Interoperability.
André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono
2024SoK: Technical Implementation and Human Impact of Internet Privacy Regulations.
Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan A. Hutson, Ada Lerner
2024SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi
2024SoK: Unintended Interactions among Machine Learning Defenses and Risks.
Vasisht Duddu, Sebastian Szyller, N. Asokan
2024Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu
2024Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale.
Hans W. A. Hanley, Deepak Kumar, Zakir Durumeric
2024Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution.
Zhe Ye, Ujval Misra, Jiajun Cheng, Wenyang Zhou, Dawn Song
2024Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length.
Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang
2024SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations.
Borui Yang, Wei Li, Liyao Xiang, Bo Li
2024Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags.
Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida
2024Surveilling the Masses with Wi-Fi-Based Positioning Systems.
Erik C. Rye, Dave Levin
2024Sweep-UC: Swapping Coins Privately.
Lucjan Hanzlik, Julian Loss, Sri Aravinda Krishnan Thyagarajan, Benedikt Wagner
2024SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More.
Nan Wang, Sid Chi-Kin Chau, Dongxi Liu
2024Synq: Public Policy Analytics Over Encrypted Data.
Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin
2024SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing.
Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian
2024SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah
2024TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake.
Yepeng Pan, Christian Rossow
2024Tabbed Out: Subverting the Android Custom Tab Security Model.
Philipp Beer, Marco Squarcina, Lorenzo Veronese, Martina Lindorfer
2024Targeted and Troublesome: Tracking and Advertising on Children's Websites.
Zahra Moti, Asuman Senol, Hamid Bostani, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar
2024Test-Time Poisoning Attacks Against Test-Time Adaptation Models.
Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
2024Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren
2024The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations.
Wei Liu, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai
2024The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web.
Soheil Khodayari, Thomas Barber, Giancarlo Pellegrino
2024The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain.
Yash Vekaria, Rishab Nithyanand, Zubair Shafiq
2024The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania.
Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye
2024The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News.
Chris Tsoukaladelis, Brian Kondracki, Niranjan Balasubramanian, Nick Nikiforakis
2024Threshold ECDSA in Three Rounds.
Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat
2024Thwarting Last-Minute Voter Coercion.
Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schürmann
2024Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation.
Palak Jain, Adam Smith, Connor Wagaman
2024Titan : Efficient Multi-target Directed Greybox Fuzzing.
Heqing Huang, Peisen Yao, Hung-Chun Chiu, Yiyuan Guo, Charles Zhang
2024To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape.
Jannis Rautenstrauch, Metodi Mitkov, Thomas Helbrecht, Lorenz Hetterich, Ben Stock
2024To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices.
Sönke Huster, Matthias Hollick, Jiska Classen
2024Towards Smart Contract Fuzzing on GPUs.
Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang
2024Transferable Multimodal Attack on Vision-Language Pre-training Models.
Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu
2024TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim
2024TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
2024UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets.
Jubayer Mahmod, Matthew Hicks
2024Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences.
Zhengyu Liu, Kecheng An, Yinzhi Cao
2024Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality.
Jiaxun Cao, Abhinaya S. B., Anupam Das, Pardis Emami Naeini
2024Understanding and Benchmarking the Commonality of Adversarial Examples.
Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu
2024Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
Jiacen Xu, Xiaokui Shu, Zhou Li
2024Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites.
Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni
2024Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso
2024Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras.
Ben Nassi, Etay Iluz, Or Hai Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
2024WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP.
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde
2024Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables.
Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik
2024Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research.
Florian Hantke, Sebastian Roth, Rafael Mrowczynski, Christine Utz, Ben Stock
2024Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Enze Wang, Jianjun Chen, Wei Xie, Chuhan Wang, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang
2024Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto
2024Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
2024Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang
2024You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content.
Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang
2024eAudit: A Fast, Scalable and Deployable Audit Data Collection System.
R. Sekar, Hanke Kimm, Rohit Aich
2024hinTS: Threshold Signatures with Silent Setup.
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang